The Developer's Playbook for Large Language Model Security Audiolibro Por Steve Wilson arte de portada

The Developer's Playbook for Large Language Model Security

Building Secure AI Applications

Vista previa
Prueba por $0.00
Prime logotipo Exclusivo para miembros Prime: ¿Nuevo en Audible? Obtén 2 audiolibros gratis con tu prueba.
Elige 1 audiolibro al mes de nuestra inigualable colección.
Escucha todo lo que quieras de entre miles de audiolibros, Originals y podcasts incluidos.
Accede a ofertas y descuentos exclusivos.
Premium Plus se renueva automáticamente por $14.95 al mes después de 30 días. Cancela en cualquier momento.

The Developer's Playbook for Large Language Model Security

De: Steve Wilson
Narrado por: Jonathan Yen
Prueba por $0.00

$14.95 al mes después de 30 días. Cancela en cualquier momento.

Compra ahora por $13.99

Compra ahora por $13.99

Confirma la compra
la tarjeta con terminación
Al confirmar tu compra, aceptas las Condiciones de Uso de Audible y el Aviso de Privacidad de Amazon. Impuestos a cobrar según aplique.
Cancelar

Acerca de esta escucha

Large language models (LLMs) are not just shaping the trajectory of AI, they're also unveiling a new era of security challenges. This practical book takes you straight to the heart of these threats. Author Steve Wilson, chief product officer at Exabeam, focuses exclusively on LLMs, eschewing generalized AI security to delve into the unique characteristics and vulnerabilities inherent in these models.

Complete with collective wisdom gained from the creation of the OWASP Top 10 for LLMs list—a feat accomplished by more than 400 industry experts—this guide delivers real-world guidance and practical strategies to help developers and security teams grapple with the realities of LLM applications. Whether you're architecting a new application or adding AI features to an existing one, this book is your go-to resource for mastering the security landscape of the next frontier in AI.

You'll learn:

  • Why LLMs present unique security challenges
  • How to navigate the many risk conditions associated with using LLM technology
  • How to identify the top risks and vulnerabilities associated with LLMs
  • Methods for deploying defenses to protect against attacks on top vulnerabilities

And more!

©2024 Stephen Wilson (P)2025 Ascent Audio
Informática Inspirador Ciencia de datos Aprendizaje automático Desarrollo de software
adbl_web_global_use_to_activate_T1_webcro805_stickypopup
Todavía no hay opiniones